Singapore Management University

Displaying 1-8 of 8 results

  • White Papers // Nov 2010

    A Review of the Professionalization of the Software Industry: Has it Made Software Engineering a Real Profession?

    Every industry strives to be called a "Profession", and software engineering is no exception. This paper attempts to define "Profession" from three different perspectives and provides a chronological narration of the professionalization efforts of major IT bodies such as the IEEE Computer Society, Association of Computing Machinery and British Computer...

    Provided By Singapore Management University

  • White Papers // May 2010

    Fighting Coercion Attacks in Key Generation using Skin Conductance

    Many techniques have been proposed to generate keys including text passwords, graphical passwords, biometric data and etc. Most of these techniques are not resistant to coercion attacks in which the user is forcefully asked by an attacker to generate the key to gain access to the system or to decrypt...

    Provided By Singapore Management University

  • White Papers // Jan 2010

    Practical ID-Based Encryption for Wireless Sensor Network

    In this paper, the authors propose a new practical identity-based encryption scheme which is suitable for Wireless Sensor Network (WSN). The authors call it Receiver-Bounded Online/Offline Identity-based Encryption (RB-OOIBE). It splits the encryption process into two parts - the offline and the online part. In the offline part, all heavy...

    Provided By Singapore Management University

  • White Papers // Jan 2010

    On the Potential of Limitation-Oriented Malware Detection and Prevention Techniques on Mobile Phones

    The malware threat for mobile phones is expected to increase with the functionality enhancement of mobile phones. This threat is exacerbated with the surge in population of smart phones instilled with stable Internet access which provides attractive targets for malware developers. Prior research on malware protection has focused on avoiding...

    Provided By Singapore Management University

  • White Papers // Aug 2009

    Essential Spreadsheet Modeling Course for Business Students

    Learning the art of modeling constitutes more than exposure to models and computing solutions. The latter has evidently been the primary approach so far. Modeling is really about dealing with open-ended questions, navigating around assumption and trying to make some sense of the situation. It must explore unspoken possibilities and...

    Provided By Singapore Management University

  • White Papers // Apr 2009

    Conditional Proxy Broadcast Re-Encryption

    A Proxy RE-encryption (PRE) scheme supports the delegation of decryption rights via a proxy, who makes the ciphertexts de-cryptable by the delegatee. PRE is useful in various applications such as encrypted email forwarding. In this paper, the authors introduce a more generalized notion of Conditional Proxy Broadcast RE-encryption (CPBRE). A...

    Provided By Singapore Management University

  • White Papers // Feb 2009

    The Impact of Process Choice in High Maturity Environments: An Empirical Analysis

    The authors present the results of a three year field study of the software development process choices made by project teams at two leading offshore vendors. In particular, they focus on the performance implications of project teams that chose to augment structured, plan-driven processes to implement the CMM level-5 Key...

    Provided By Singapore Management University

  • White Papers // Feb 2009

    Analyzing And Forecasting Business Cycles In A Small Open Economy: A Dynamic Factor Model For Singapore

    A dynamic factor model is applied to a large panel dataset of Singapore's macroeconomic variables and global economic indicators with the initial objective of analyzing business cycles in a small open economy. The empirical results suggest that four common factors are present in the quarterly time series, which can broadly...

    Provided By Singapore Management University

  • White Papers // Feb 2009

    The Impact of Process Choice in High Maturity Environments: An Empirical Analysis

    The authors present the results of a three year field study of the software development process choices made by project teams at two leading offshore vendors. In particular, they focus on the performance implications of project teams that chose to augment structured, plan-driven processes to implement the CMM level-5 Key...

    Provided By Singapore Management University

  • White Papers // Nov 2010

    A Review of the Professionalization of the Software Industry: Has it Made Software Engineering a Real Profession?

    Every industry strives to be called a "Profession", and software engineering is no exception. This paper attempts to define "Profession" from three different perspectives and provides a chronological narration of the professionalization efforts of major IT bodies such as the IEEE Computer Society, Association of Computing Machinery and British Computer...

    Provided By Singapore Management University

  • White Papers // Apr 2009

    Conditional Proxy Broadcast Re-Encryption

    A Proxy RE-encryption (PRE) scheme supports the delegation of decryption rights via a proxy, who makes the ciphertexts de-cryptable by the delegatee. PRE is useful in various applications such as encrypted email forwarding. In this paper, the authors introduce a more generalized notion of Conditional Proxy Broadcast RE-encryption (CPBRE). A...

    Provided By Singapore Management University

  • White Papers // Aug 2009

    Essential Spreadsheet Modeling Course for Business Students

    Learning the art of modeling constitutes more than exposure to models and computing solutions. The latter has evidently been the primary approach so far. Modeling is really about dealing with open-ended questions, navigating around assumption and trying to make some sense of the situation. It must explore unspoken possibilities and...

    Provided By Singapore Management University

  • White Papers // Jan 2010

    On the Potential of Limitation-Oriented Malware Detection and Prevention Techniques on Mobile Phones

    The malware threat for mobile phones is expected to increase with the functionality enhancement of mobile phones. This threat is exacerbated with the surge in population of smart phones instilled with stable Internet access which provides attractive targets for malware developers. Prior research on malware protection has focused on avoiding...

    Provided By Singapore Management University

  • White Papers // Feb 2009

    Analyzing And Forecasting Business Cycles In A Small Open Economy: A Dynamic Factor Model For Singapore

    A dynamic factor model is applied to a large panel dataset of Singapore's macroeconomic variables and global economic indicators with the initial objective of analyzing business cycles in a small open economy. The empirical results suggest that four common factors are present in the quarterly time series, which can broadly...

    Provided By Singapore Management University

  • White Papers // Jan 2010

    Practical ID-Based Encryption for Wireless Sensor Network

    In this paper, the authors propose a new practical identity-based encryption scheme which is suitable for Wireless Sensor Network (WSN). The authors call it Receiver-Bounded Online/Offline Identity-based Encryption (RB-OOIBE). It splits the encryption process into two parts - the offline and the online part. In the offline part, all heavy...

    Provided By Singapore Management University

  • White Papers // May 2010

    Fighting Coercion Attacks in Key Generation using Skin Conductance

    Many techniques have been proposed to generate keys including text passwords, graphical passwords, biometric data and etc. Most of these techniques are not resistant to coercion attacks in which the user is forcefully asked by an attacker to generate the key to gain access to the system or to decrypt...

    Provided By Singapore Management University